5.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
7.1 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.9%
A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
[
{
"product": "dpdk",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "20.02.1"
},
{
"status": "affected",
"version": "19.11.2"
},
{
"status": "affected",
"version": "18.11.8"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html
bugs.dpdk.org/show_bug.cgi?id=267
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/
usn.ubuntu.com/4362-1/
www.openwall.com/lists/oss-security/2020/05/18/2
www.oracle.com/security-alerts/cpujan2021.html
www.oracle.com/security-alerts/cpuoct2020.html
5.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
7.1 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.9%